On remote exploitation of TCP sender for low-rate flooding denial-of-service attack

  • Authors:
  • V. Anil Kumar;P. S. Jayalekshmy;G. K. Patra;R. P. Thangavelu

  • Affiliations:
  • C-MMACS, Council of Scientific and Industrial Research, Bangalore, India;C-MMACS, Council of Scientific and Industrial Research, Bangalore, India;C-MMACS, Council of Scientific and Industrial Research, Bangalore, India;C-MMACS, Council of Scientific and Industrial Research, Bangalore, India

  • Venue:
  • IEEE Communications Letters
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

This letter shows a potentially harmful scenario named Induced-shrew attack in which a malicious TCP receiver remotely controls the transmission rate and pattern of a TCP sender to exploit it as a flood source for launching low-rate Denial-of-Service (DoS) attacks. Through simulation, proof-of-concept implementation and experimentation in testbed and real-world Internet paths, we demonstrate that standard implementation of TCP senders can be exploited as flood sources for low-rate DoS attacks without compromising them. We describe the nature of the underlying vulnerability and discuss possible countermeasures against the Induced-shrew.